In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data.
| LATEST SECURITY NEWS & COMMENTARY | 56 Vulnerabilities Discovered in OT Products From 10 Different Vendors Deep-dive study unearthed security flaws that could allow remote code execution, file manipulation, and malicious firmware uploads, among other badness. Risk Disconnect in the Cloud New Cloud Security Alliance (CSA) and Google Cloud study shows many enterprises struggle to measure and manage risk in their cloud workloads. VPNs Persist Despite Zero-Trust Fervor Most organizations still rely on virtual private networks for secure remote access. China-Linked ToddyCat APT Pioneers Novel Spyware ToddyCat's Samurai and Ninja tools are designed to give attackers persistent and deep access on compromised networks, security vendor says. BRATA Android Malware Evolves Into an APT The BRATA Android banking Trojan is evolving into a persistent threat with a new phishing technique and event-logging capabilities. Why Financial Institutions Must Double Down on Open Source Investments Open source is here to stay, and it's imperative that CIOs have a mature, open source engagement strategy, across consumption, contribution, and funding as a pillar of digital transformation. AI Is Not a Security Silver Bullet AI can help companies more effectively identify and respond to threats, as well as harden applications. RIG Exploit Kit Replaces Raccoon Stealer Trojan With Dridex After the Raccoon Stealer Trojan disappeared, the RIG Exploit Kit seamlessly adopted Dridex for credential theft. MORE NEWS / MORE COMMENTARY | |
| EDITORS' CHOICE | 7 Ways to Avoid Worst-Case Cyber Scenarios In the wake of devastating attacks, here are some of the best techniques and policies a company can implement to protect its data. LATEST FROM THE EDGE Evolving Beyond the Password: It's Time to Up the Ante While there's an immediate need to improve MFA adoption, it's also critical to move to more advanced and secure passwordless frameworks, including biometrics. (Part 1 of 2) LATEST FROM DR TECHNOLOGY Reducing Risk With Zero Trust Zero trust isn’t just about authentication. Organizations can combine identity data with business awareness to address issues such as insider threat. | |
| | |
|
Dark Reading Daily -- Published By Dark Reading Informa Tech Holdings LLC | Registered in the United States with number 7418737 | 605 Third Ave., 22nd Floor, New York, New York 10158, USA
| To opt-out of any future Dark Reading Daily Newsletter emails, please respond here. | Thoughts about this newsletter? Give us feedback. |
Keep This Newsletter Out Of Your SPAM Folder Don't let future editions go missing. Take a moment to add the newsletter's address to your anti-spam white list: | If you're not sure how to do that, ask your administrator or ISP. Or check your anti-spam utility's documentation. | We take your privacy very seriously. Please review our Privacy Statement. |
|
|